SlideShare une entreprise Scribd logo
1  sur  6
Télécharger pour lire hors ligne
Valu I.T. SECURITY /
ETHICAL HACKING
________________________________________________________________________________________
________________________________________________________________________________________
©Copyright is in favour of CREZONE Technologies,
Corp. Office:18-NWA, IInd
Floor Club Road Punjabi Bagh New Delhi-26
Rohtak Office:21-22, C/o TSPL College of I.T., Geeta Complex, Rohtak-124001
9212112833, 9711380009, 9212342833, 8685810211
www.crezonetech.com
contact@crezonetech.com , training@crezonetech.com , info@crezonetech.com
WITH ASSOCIATION OF COMPUTER SOCIETY OF
INDIA
&
GUIDELINES GIVEN BY A.I.C.T.E FOR VOCATION
STUDIES
CREZONE TECHNOLOGIES STARTING
VOCATIONAL  INDUSTRIAL
TRAINING
FOR
M.C.A / B.TECH (C.S.E/ I.T./ E.C.E) / M.TECH
(C.S.E / I.T./ E.C.E)
Valu I.T. SECURITY /
ETHICAL HACKING
________________________________________________________________________________________
________________________________________________________________________________________
©Copyright is in favour of CREZONE Technologies,
Corp. Office:18-NWA, IInd
Floor Club Road Punjabi Bagh New Delhi-26
Rohtak Office:21-22, C/o TSPL College of I.T., Geeta Complex, Rohtak-124001
9212112833, 9711380009, 9212342833, 8685810211
www.crezonetech.com
contact@crezonetech.com , training@crezonetech.com , info@crezonetech.com
TRAINING CONTENTS STRUCTURE DURATION : 6 MONTHS
MODULE – I
System Hacking
 Operating System hacking
 Virtualization
 Password Cracking
 Customizing Windows
 Operating system vulnerabilities
 Locating Viruses in Operating system
 Window hidden tools and utilities
 Windows Firewall
Basics of Hacking
 Definition of hacking
 Hacking Legal or Illegal?
 Future Scope in this Field
 Job Opportunities
 Types of Hackers
 White Hat Hacker
 Black Hat Hacker
 Grey Hat Hacker
 Suicide Hackers
Facebook/Yahoo/Gmail/Twitter
 E-mail Hacking
Valu I.T. SECURITY /
ETHICAL HACKING
________________________________________________________________________________________
________________________________________________________________________________________
©Copyright is in favour of CREZONE Technologies,
Corp. Office:18-NWA, IInd
Floor Club Road Punjabi Bagh New Delhi-26
Rohtak Office:21-22, C/o TSPL College of I.T., Geeta Complex, Rohtak-124001
9212112833, 9711380009, 9212342833, 8685810211
www.crezonetech.com
contact@crezonetech.com , training@crezonetech.com , info@crezonetech.com
 Sending Fake Mail
 Detecting Fake email’s
 Email Bombing
 Making own fake mailer/bomber Script
 Email Phising
 Email password Hacking (Facebook/gmail/yahoomail)
 Step Verification (Only for gmail)
MALWARES
 Creating Trojan
 Working of Trojan
 Creating Viruses
 Spreading Viruses and Trojans
 Spywares(Keyloggers)
 Spreading Virus
 Isrealer 6.0,6.3 Legend Pack (Setup)
 Implementing Java Drive
 Compromising Remote System
 Detection & removal of Trojan Viruses,Spywares
 How to Make virus Undeteactable Using Crypters
 Crypting
Web Application hacking
 Credit Card Hacking (Free Online shoping)
 Efficient Google Searching
 Hacking CCTV Camera (Google cam dorks)
 Finding Websites Ip address
Valu I.T. SECURITY /
ETHICAL HACKING
________________________________________________________________________________________
________________________________________________________________________________________
©Copyright is in favour of CREZONE Technologies,
Corp. Office:18-NWA, IInd
Floor Club Road Punjabi Bagh New Delhi-26
Rohtak Office:21-22, C/o TSPL College of I.T., Geeta Complex, Rohtak-124001
9212112833, 9711380009, 9212342833, 8685810211
www.crezonetech.com
contact@crezonetech.com , training@crezonetech.com , info@crezonetech.com
 Locating Server ip addresses where Website’s get hosted (via ping, tools)
 Locating websites
 Footprinting website’s
 Finding Admin pages of site’s (tool)
 Sql Injection Attacks (using tool Havij)
 XSS ATTACKS
 What is Shell (c99,r57, 404, barc0de mini)
 Shell Uploading
 What isDefacement page
 Website Defacement
 Using Bots to attack system’s/site
 Web Scanners
 Website penetration testing and assessment
Internet Security & Proxy
 Introduction to proxies
 Anonymous proxy
 Elite Proxy
 Web based Proxies
 Tor Web Browser
 Ip Spoofing Attacks
 Mac Address change
Reverse Engineering or Software Cracking
 Disassembling the Softwares
 Getting the code of EXEs
 Manipulating the Code of EXEs
 Dis-assemblers & Debuggers
Valu I.T. SECURITY /
ETHICAL HACKING
________________________________________________________________________________________
________________________________________________________________________________________
©Copyright is in favour of CREZONE Technologies,
Corp. Office:18-NWA, IInd
Floor Club Road Punjabi Bagh New Delhi-26
Rohtak Office:21-22, C/o TSPL College of I.T., Geeta Complex, Rohtak-124001
9212112833, 9711380009, 9212342833, 8685810211
www.crezonetech.com
contact@crezonetech.com , training@crezonetech.com , info@crezonetech.com
 Olly DBG
 Windows Dis-assembler
 Software Cracking & Serial Key Phishing
 Analyzing Assembly Code of Software
 Tracing the Error Message
 Setting Break Point
 Stepping the Assembly Code
 Checking the Registers for the Key
Attacks On demand
MODULE-II
ADVANCE HACKING
 Tamper Data
 IRC Botnet
 Password Stealer (Paid)
 Shell Backdooring
 What is an IFrame Injection ?
 Windows Based IIS 7 Websites Hacking
 Installing Back Track 5R3
 Website Hacking with Sqlmap (Sql Injection)
 WebVulScan Web Application Vulnerability Scanner Setup
 Advance WiFi Hacking
 Waffit tool on BackTrack 5 R3
 Metasploit Framework
 Nmap Advanced Scanning
 Pentesting A Website
 Setting Up Your Pentest Labs
Valu I.T. SECURITY /
ETHICAL HACKING
________________________________________________________________________________________
________________________________________________________________________________________
©Copyright is in favour of CREZONE Technologies,
Corp. Office:18-NWA, IInd
Floor Club Road Punjabi Bagh New Delhi-26
Rohtak Office:21-22, C/o TSPL College of I.T., Geeta Complex, Rohtak-124001
9212112833, 9711380009, 9212342833, 8685810211
www.crezonetech.com
contact@crezonetech.com , training@crezonetech.com , info@crezonetech.com
 Social Engineering Toolkit (INTRO)
 HTTP Hacking Man In The Middle Attack(MITMA)
 Advance Phishing (MITM)
 System Hacking with Social Engineering Toolkit (SET)
 Port Scanning
 DDOS (Denial Of Service)
 Bruteforce
 Mass Uploading on zone-h
 Scanning web site with Uniscan and Nikto perl scanner on BackTrack 5 R2
 What is Backbox n How to install Backbox in VMware (xrhstos)

Contenu connexe

Dernier

A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024Results
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhisoniya singh
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...HostedbyConfluent
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Paola De la Torre
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Allon Mureinik
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Alan Dix
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersThousandEyes
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 

Dernier (20)

A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 

En vedette

PEPSICO Presentation to CAGNY Conference Feb 2024
PEPSICO Presentation to CAGNY Conference Feb 2024PEPSICO Presentation to CAGNY Conference Feb 2024
PEPSICO Presentation to CAGNY Conference Feb 2024Neil Kimberley
 
Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)contently
 
How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024Albert Qian
 
Social Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie InsightsSocial Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie InsightsKurio // The Social Media Age(ncy)
 
Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024Search Engine Journal
 
5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summary5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summarySpeakerHub
 
ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd Clark Boyd
 
Getting into the tech field. what next
Getting into the tech field. what next Getting into the tech field. what next
Getting into the tech field. what next Tessa Mero
 
Google's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search IntentGoogle's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search IntentLily Ray
 
Time Management & Productivity - Best Practices
Time Management & Productivity -  Best PracticesTime Management & Productivity -  Best Practices
Time Management & Productivity - Best PracticesVit Horky
 
The six step guide to practical project management
The six step guide to practical project managementThe six step guide to practical project management
The six step guide to practical project managementMindGenius
 
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...RachelPearson36
 
Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...
Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...
Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...Applitools
 
12 Ways to Increase Your Influence at Work
12 Ways to Increase Your Influence at Work12 Ways to Increase Your Influence at Work
12 Ways to Increase Your Influence at WorkGetSmarter
 
Ride the Storm: Navigating Through Unstable Periods / Katerina Rudko (Belka G...
Ride the Storm: Navigating Through Unstable Periods / Katerina Rudko (Belka G...Ride the Storm: Navigating Through Unstable Periods / Katerina Rudko (Belka G...
Ride the Storm: Navigating Through Unstable Periods / Katerina Rudko (Belka G...DevGAMM Conference
 

En vedette (20)

Skeleton Culture Code
Skeleton Culture CodeSkeleton Culture Code
Skeleton Culture Code
 
PEPSICO Presentation to CAGNY Conference Feb 2024
PEPSICO Presentation to CAGNY Conference Feb 2024PEPSICO Presentation to CAGNY Conference Feb 2024
PEPSICO Presentation to CAGNY Conference Feb 2024
 
Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)
 
How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024
 
Social Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie InsightsSocial Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie Insights
 
Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024
 
5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summary5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summary
 
ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd
 
Getting into the tech field. what next
Getting into the tech field. what next Getting into the tech field. what next
Getting into the tech field. what next
 
Google's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search IntentGoogle's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search Intent
 
How to have difficult conversations
How to have difficult conversations How to have difficult conversations
How to have difficult conversations
 
Introduction to Data Science
Introduction to Data ScienceIntroduction to Data Science
Introduction to Data Science
 
Time Management & Productivity - Best Practices
Time Management & Productivity -  Best PracticesTime Management & Productivity -  Best Practices
Time Management & Productivity - Best Practices
 
The six step guide to practical project management
The six step guide to practical project managementThe six step guide to practical project management
The six step guide to practical project management
 
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
 
Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...
Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...
Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...
 
12 Ways to Increase Your Influence at Work
12 Ways to Increase Your Influence at Work12 Ways to Increase Your Influence at Work
12 Ways to Increase Your Influence at Work
 
ChatGPT webinar slides
ChatGPT webinar slidesChatGPT webinar slides
ChatGPT webinar slides
 
More than Just Lines on a Map: Best Practices for U.S Bike Routes
More than Just Lines on a Map: Best Practices for U.S Bike RoutesMore than Just Lines on a Map: Best Practices for U.S Bike Routes
More than Just Lines on a Map: Best Practices for U.S Bike Routes
 
Ride the Storm: Navigating Through Unstable Periods / Katerina Rudko (Belka G...
Ride the Storm: Navigating Through Unstable Periods / Katerina Rudko (Belka G...Ride the Storm: Navigating Through Unstable Periods / Katerina Rudko (Belka G...
Ride the Storm: Navigating Through Unstable Periods / Katerina Rudko (Belka G...
 

IT Security-Ethical Hacking Training Institue in Delhi

  • 1. Valu I.T. SECURITY / ETHICAL HACKING ________________________________________________________________________________________ ________________________________________________________________________________________ ©Copyright is in favour of CREZONE Technologies, Corp. Office:18-NWA, IInd Floor Club Road Punjabi Bagh New Delhi-26 Rohtak Office:21-22, C/o TSPL College of I.T., Geeta Complex, Rohtak-124001 9212112833, 9711380009, 9212342833, 8685810211 www.crezonetech.com contact@crezonetech.com , training@crezonetech.com , info@crezonetech.com WITH ASSOCIATION OF COMPUTER SOCIETY OF INDIA & GUIDELINES GIVEN BY A.I.C.T.E FOR VOCATION STUDIES CREZONE TECHNOLOGIES STARTING VOCATIONAL INDUSTRIAL TRAINING FOR M.C.A / B.TECH (C.S.E/ I.T./ E.C.E) / M.TECH (C.S.E / I.T./ E.C.E)
  • 2. Valu I.T. SECURITY / ETHICAL HACKING ________________________________________________________________________________________ ________________________________________________________________________________________ ©Copyright is in favour of CREZONE Technologies, Corp. Office:18-NWA, IInd Floor Club Road Punjabi Bagh New Delhi-26 Rohtak Office:21-22, C/o TSPL College of I.T., Geeta Complex, Rohtak-124001 9212112833, 9711380009, 9212342833, 8685810211 www.crezonetech.com contact@crezonetech.com , training@crezonetech.com , info@crezonetech.com TRAINING CONTENTS STRUCTURE DURATION : 6 MONTHS MODULE – I System Hacking  Operating System hacking  Virtualization  Password Cracking  Customizing Windows  Operating system vulnerabilities  Locating Viruses in Operating system  Window hidden tools and utilities  Windows Firewall Basics of Hacking  Definition of hacking  Hacking Legal or Illegal?  Future Scope in this Field  Job Opportunities  Types of Hackers  White Hat Hacker  Black Hat Hacker  Grey Hat Hacker  Suicide Hackers Facebook/Yahoo/Gmail/Twitter  E-mail Hacking
  • 3. Valu I.T. SECURITY / ETHICAL HACKING ________________________________________________________________________________________ ________________________________________________________________________________________ ©Copyright is in favour of CREZONE Technologies, Corp. Office:18-NWA, IInd Floor Club Road Punjabi Bagh New Delhi-26 Rohtak Office:21-22, C/o TSPL College of I.T., Geeta Complex, Rohtak-124001 9212112833, 9711380009, 9212342833, 8685810211 www.crezonetech.com contact@crezonetech.com , training@crezonetech.com , info@crezonetech.com  Sending Fake Mail  Detecting Fake email’s  Email Bombing  Making own fake mailer/bomber Script  Email Phising  Email password Hacking (Facebook/gmail/yahoomail)  Step Verification (Only for gmail) MALWARES  Creating Trojan  Working of Trojan  Creating Viruses  Spreading Viruses and Trojans  Spywares(Keyloggers)  Spreading Virus  Isrealer 6.0,6.3 Legend Pack (Setup)  Implementing Java Drive  Compromising Remote System  Detection & removal of Trojan Viruses,Spywares  How to Make virus Undeteactable Using Crypters  Crypting Web Application hacking  Credit Card Hacking (Free Online shoping)  Efficient Google Searching  Hacking CCTV Camera (Google cam dorks)  Finding Websites Ip address
  • 4. Valu I.T. SECURITY / ETHICAL HACKING ________________________________________________________________________________________ ________________________________________________________________________________________ ©Copyright is in favour of CREZONE Technologies, Corp. Office:18-NWA, IInd Floor Club Road Punjabi Bagh New Delhi-26 Rohtak Office:21-22, C/o TSPL College of I.T., Geeta Complex, Rohtak-124001 9212112833, 9711380009, 9212342833, 8685810211 www.crezonetech.com contact@crezonetech.com , training@crezonetech.com , info@crezonetech.com  Locating Server ip addresses where Website’s get hosted (via ping, tools)  Locating websites  Footprinting website’s  Finding Admin pages of site’s (tool)  Sql Injection Attacks (using tool Havij)  XSS ATTACKS  What is Shell (c99,r57, 404, barc0de mini)  Shell Uploading  What isDefacement page  Website Defacement  Using Bots to attack system’s/site  Web Scanners  Website penetration testing and assessment Internet Security & Proxy  Introduction to proxies  Anonymous proxy  Elite Proxy  Web based Proxies  Tor Web Browser  Ip Spoofing Attacks  Mac Address change Reverse Engineering or Software Cracking  Disassembling the Softwares  Getting the code of EXEs  Manipulating the Code of EXEs  Dis-assemblers & Debuggers
  • 5. Valu I.T. SECURITY / ETHICAL HACKING ________________________________________________________________________________________ ________________________________________________________________________________________ ©Copyright is in favour of CREZONE Technologies, Corp. Office:18-NWA, IInd Floor Club Road Punjabi Bagh New Delhi-26 Rohtak Office:21-22, C/o TSPL College of I.T., Geeta Complex, Rohtak-124001 9212112833, 9711380009, 9212342833, 8685810211 www.crezonetech.com contact@crezonetech.com , training@crezonetech.com , info@crezonetech.com  Olly DBG  Windows Dis-assembler  Software Cracking & Serial Key Phishing  Analyzing Assembly Code of Software  Tracing the Error Message  Setting Break Point  Stepping the Assembly Code  Checking the Registers for the Key Attacks On demand MODULE-II ADVANCE HACKING  Tamper Data  IRC Botnet  Password Stealer (Paid)  Shell Backdooring  What is an IFrame Injection ?  Windows Based IIS 7 Websites Hacking  Installing Back Track 5R3  Website Hacking with Sqlmap (Sql Injection)  WebVulScan Web Application Vulnerability Scanner Setup  Advance WiFi Hacking  Waffit tool on BackTrack 5 R3  Metasploit Framework  Nmap Advanced Scanning  Pentesting A Website  Setting Up Your Pentest Labs
  • 6. Valu I.T. SECURITY / ETHICAL HACKING ________________________________________________________________________________________ ________________________________________________________________________________________ ©Copyright is in favour of CREZONE Technologies, Corp. Office:18-NWA, IInd Floor Club Road Punjabi Bagh New Delhi-26 Rohtak Office:21-22, C/o TSPL College of I.T., Geeta Complex, Rohtak-124001 9212112833, 9711380009, 9212342833, 8685810211 www.crezonetech.com contact@crezonetech.com , training@crezonetech.com , info@crezonetech.com  Social Engineering Toolkit (INTRO)  HTTP Hacking Man In The Middle Attack(MITMA)  Advance Phishing (MITM)  System Hacking with Social Engineering Toolkit (SET)  Port Scanning  DDOS (Denial Of Service)  Bruteforce  Mass Uploading on zone-h  Scanning web site with Uniscan and Nikto perl scanner on BackTrack 5 R2  What is Backbox n How to install Backbox in VMware (xrhstos)